Penetration testing resources
Download a range of different resources such as guides, datasheets, infographics and green papers providing technical guidance to help support your penetration testing programme.
Webinar – Cyber security: protecting your business with cost-effective penetration testing
Our penetration testing experts share practical insights about implementing a penetration testing programme. Designed to inform information security professionals, this webinar will help you to conduct effective, value-for-money penetration testing as part of a technical security assurance framework.
White paper - Assured Security: Getting cyber secure with penetration testing
Most organisations are the target of random, indiscriminate attacks, and they need an appropriate level of penetration testing to ensure their defences are adequate. But while many organisations know they need penetration testing, it can be hard to know how to fit them in to a larger security programme, or even how to get started.
Our white paper, "Assured Security: Getting cyber secure with penetration testing", provides a clear introduction to best-practice penetration testing.
Data sheet - Are your critical assets safe from hackers?
A penetration test identifies the vulnerabilities that leave your infrastructure and applications exposed, and gives you the information you need to close any gaps in your security.
Learn how IT Governance approaches a penetration test and how our penetration testing services can strengthen your security posture.
Case study – Collinson Group
Collinson Group is a rapidly evolving organisation that operates a diverse set of market-leading technologies. It needs its systems to be secure and dependable, but it had no way of knowing whether its defences provide adequate protection. Penetration testing provides that information.
Download the case study to find out how penetration testing helped Collinson Group test its ability to protect its applications.
Infographic - What is a penetration test and why would my company need one?
Hacking is not the preserve of master cyber criminals. Unskilled computer users can easily download and run hacking software designed to search for, find and exploit known vulnerabilities wherever they occur.
This infographic gathers the latest facts and figures on cyber attacks and hacking, and offers reasons organisations should test the security of their IT infrastructure – from networks to applications.
Infographic - Is your Wi-Fi under attack?
Wireless capabilities can provide opportunities for attackers to infiltrate an organisation’s secured environment – irrespective of security access controls. Pen testing can help validate weaknesses in the wireless infrastructure.
This infographic describes the common types of Wi-Fi attack and how penetration testing can help to validate weaknesses.
Infographic - Are your employees resistant to phishing attacks?
As phishing attacks increase in frequency and sophistication, it is critically important that end users and businesses learn to identify them and how to react when they are being targeted.
To do our part in spreading cyber security awareness, we’ve created an infographic covering phishing attacks and what users can do to protect themselves against this common online threat.
Infographic - Is your web app under attack?
Web applications often process and/or store sensitive information including personally identifiable information, cardholder data and proprietary data. They connect with the corporate infrastructure and can communicate freely with the corporate Cloud at the point that users grant access through open authentication.
This infographic describes the application dilemma and offers suggestions for helping to answer the threat.
Infographic - Is your network under attack?
Network penetration tests focus on the organisation’s boundaries – how it connects with the Internet and other external systems. If the interfaces are not designed correctly, this creates a perfect loophole for hackers to enter a network.
This infographic describes the risks posed to the network from both internal and external threats.
Penetration testing and the GDPR
Article 32 of the Regulation requires organisations to implement technical measures to ensure data security. For GDPR compliance, penetration tests are crucial because they provide a final, end-of-state check to make sure all the security controls required have been implemented correctly. They can also be used in the early stages of developing new processing systems to identify potential risks to personal data.
Download this green paper for practical guidance on how to conduct a penetration test that supports GDPR compliance.
Green paper - Penetration testing and ISO 27001
Penetration testing is an essential component of any ISO 27001 information security management system (ISMS), from initial development through to ongoing maintenance and continual improvement.
This free green paper describes how penetration testing fits into an ISO 27001 ISMS project.
Speak to an expert
Please contact us for further information or to speak to an expert.